وب سایت تخصصی شرکت فرین
دسته بندی دوره ها
2

CompTIA Security+ (SY0-701) Practical Skills

سرفصل های دوره

CompTIA Security+ (SY0-701) practical skills


1 - Introduction
  • 1 - Introduction
  • 2 - Free 10 Days Practice Exam Information.html
  • 3 - Quick Prerequisite or Expectation Check.html
  • 4 - Build a Sec Home Lab

  • 2 - Security Concept Fundamentals
  • 5 - Trainer Knowledge Share Video
  • 6 - Introduction Security Concept Fundamentals
  • 7 - Exercise 1 Configure RAID 1
  • 8 - Exercise 2 Configure and Test File Integrity Monitoring
  • 9 - Interview Questions Answers.html

  • 3 - Cryptographic Solutions
  • 10 - Introduction Cryptographic Solutions
  • 11 - Exercise 1 Create and Verify a Digital Signature
  • 13 - Interview Questions and Answers.html

  • 4 - Threat Vectors and Attack Surfaces
  • 14 - Trainer Knowledge Share Video
  • 15 - Introduction Threat Vectors and Attack Surfaces
  • 16 - Exercise 1 Open Service Ports
  • 17 - Exercise 2 Default Credentials
  • 18 - Exercise 3 Vulnerable Applications
  • 19 - Interview Questions and Answers.html

  • 5 - Identifying Security Vulnerabilities
  • 20 - Trainer Knowledge Share Video
  • 21 - Introduction Identifying Security Vulnerabilities
  • 22 - Exercise 1 Identify LM Hash Vulnerabilities
  • 23 - Exercise 2 Identify DNS Transfer Vulnerabilities
  • 24 - Interview Questions and Answers.html

  • 6 - Analyze Malicious Activity
  • 25 - Trainer Knowledge Share Video
  • 26 - Introduction Analyze Malicious Activity
  • 27 - Exercise 1 Observe Indications of a Brute Force Attack
  • 28 - Exercise 3 Observe Indications of a SYN Flood Attack
  • 29 - Interview Questions and Answers.html

  • 7 - Mitigation Techniques
  • 30 - Trainer Knowledge Share Video
  • 31 - Introduction Mitigation Techniques
  • 32 - Exercise 1 Configure Router Access
  • 33 - Exercise 2 Harden Router Access
  • 34 - Exercise 3 Configure Router Logging

  • 8 - Security Architecture Models
  • 35 - Trainer Knowledge Share Video
  • 36 - Introduction Security Architecture Models
  • 37 - Exercise 1 Create a VM
  • 38 - Exercise 2 Use Containers
  • 39 - Exercise 3 Complete VM Deployment.html

  • 9 - Securing Enterprise Infrastructures
  • 40 - Trainer Knowledge Share Video
  • 41 - Introduction Securing Enterprise Infrastructures
  • 42 - Exercise 1 Install and Configure a VPN Server
  • 43 - Exercise 2 Create a VPN User and Client
  • 44 - Exercise 3 Configure a L2TPIPsec VPN
  • 45 - Interview Questions and Answers.html

  • 10 - Data Protection Strategies
  • 46 - Trainer Knowledge Share Video
  • 47 - Introduction Data Protection Strategies
  • 48 - Exercise 1 Encryption
  • 49 - Exercise 2 Hashing
  • 50 - Exercise 3 Obfuscation
  • 51 - Interview Questions and Answers.html

  • 11 - Resilience in Security Architecture
  • 52 - Trainer Knowledge Share Video
  • 53 - Introduction Resilience in Security Architecture
  • 54 - Exercise 1 Prepare WIN11 and Install EaseUS Todo Backup
  • 55 - Exercise 2 Conduct and Restore from Incremental Backups
  • 56 - Exercise 3 Conduct Differential Backups and Examine all Backup Files
  • 57 - Exercise 4 Investigate the Archive Bit

  • 12 - Securing Computing Resources
  • 58 - Trainer Knowledge Share Video
  • 59 - Introduction Securing Computing Resources
  • 60 - Exercise 1 Establish a Baseline
  • 61 - Exercise 2 Input Validation
  • 62 - Exercise 3 Sandboxing

  • 13 - Asset Management Techniques
  • 63 - Trainer Knowledge Share Video
  • 64 - Introduction Asset Management Techniques
  • 65 - Exercise 1 Deploy an Asset and License
  • 66 - Exercise 2 Secure Data Sanitization

  • 14 - Vulnerability Management
  • 67 - Introduction Vulnerability Management
  • 68 - Trainer Knowledge Share Video
  • 69 - Exercise 1 Detect Web Application Vulnerabilities
  • 70 - Exercise 2 Monitor Devices for Vulnerabilities
  • 71 - Interview Questions and Answers.html
  • 72 - Information Tips.html
  • 73 - Security Assessments and Tools Lecture
  • 74 - Conduct a Software Vulnerability Scan Using AlienVault
  • 75 - Conduct a Software Vulnerability Scan using Nessus
  • 76 - Review a Template Incident Response Documentation

  • 15 - Monitoring Computing Resources
  • 77 - Introduction Monitoring Computing Resources
  • 78 - Exercise 1 Monitoring Device Resource Utilization
  • 79 - Interview Questions and Answers.html

  • 16 - Enhancing Enterprise Security
  • 80 - Trainer Knowledge Share Video
  • 81 - Introduction Enhancing Enterprise Security
  • 82 - Exercise 1 Linux Server Hardening Techniques
  • 83 - Exercise 2 Windows Server Hardening Techniques

  • 17 - Implement Identity Access Management
  • 84 - Trainer Knowledge Share Video
  • 85 - Introduction Implement Identity Access Management
  • 86 - Exercise 1 Provisioning User Accounts on a Microsoft Server
  • 87 - Exercise 2 Provisioning User Accounts on a Linux Server

  • 18 - Implementation of Automation Orchestration for Security Operations
  • 88 - Trainer Knowledge Share Video
  • 89 - Introduction Implementation of Automation Orchestration for Security Operation
  • 90 - Exercise 1 Creating Automation Scripts

  • 19 - Investigative Data Sources
  • 91 - Trainer Knowledge Share Video
  • 92 - Introduction Investigative Data Sources
  • 93 - Exercise 1 Log File Analysis

  • 20 - Cloud and Security
  • 94 - Information Tips.html
  • 95 - Introductory Lecture Securing Cloud Infrastructure Resources
  • 96 - Encrypt an Azure VM OS and Data Disks
  • 97 - Investigating AWS Artifact
  • 98 - Security Groups in AWS
  • 99 - Next Course to take.html
  • 100 - Bonus Lecture
  • 179,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 38294
    حجم: 6559 مگابایت
    مدت زمان: 699 دقیقه
    تاریخ انتشار: ۱۹ تیر ۱۴۰۳
    طراحی سایت و خدمات سئو

    179,000 تومان
    افزودن به سبد خرید